US10403076B2 - Method for securing and verifying a document - Google Patents

Method for securing and verifying a document Download PDF

Info

Publication number
US10403076B2
US10403076B2 US15/429,093 US201715429093A US10403076B2 US 10403076 B2 US10403076 B2 US 10403076B2 US 201715429093 A US201715429093 A US 201715429093A US 10403076 B2 US10403076 B2 US 10403076B2
Authority
US
United States
Prior art keywords
document
datum
algorithm
security datum
visual element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US15/429,093
Other versions
US20170236355A1 (en
Inventor
Herve Chabanne
Jean-Christophe Fondeur
Stephane Gentric
Erik VAN DIJK
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia Identity and Security France SAS
Original Assignee
Safran Identity and Security SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Safran Identity and Security SAS filed Critical Safran Identity and Security SAS
Publication of US20170236355A1 publication Critical patent/US20170236355A1/en
Assigned to SAFRAN IDENTITY & SECURITY reassignment SAFRAN IDENTITY & SECURITY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHABANNE, HERVE, FONDEUR, JEAN-CHRISTOPHE, GENTRIC, STEPHANE, VAN DUK, ERIK
Application granted granted Critical
Publication of US10403076B2 publication Critical patent/US10403076B2/en
Assigned to IDEMIA IDENTITY & SECURITY FRANCE reassignment IDEMIA IDENTITY & SECURITY FRANCE CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SAFRAN IDENTITY & SECURITY
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2016Testing patterns thereon using feature extraction, e.g. segmentation, edge detection or Hough-transformation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • G07D7/0032Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using holograms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • G07D7/0034Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using watermarks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • G07D7/0053Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings added to a pattern, e.g. interstitial points
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/01Testing electronic circuits therein
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/205Matching spectral properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2075Setting acceptance levels or parameters
    • G07D7/2083Learning

Definitions

  • the invention relates to the field of securing documents comprising at least one visual element.
  • Documents can be especially identity documents for example of identity card, driving license, birth certificate or passport type or else any “electronic document” (documents of personal and/or identity type) which can be hosted on a smartphone or other portable device having display means.
  • the invention also relates to verification of the integrity of such documents once secured.
  • An aim of the invention is to propose a method for securing a document, especially an identity document, ensuring especially the integrity of visual elements of the document such as photographs.
  • Another aim of the invention is to propose a method for verifying the integrity of a document secured by the proposed method.
  • Another aim of the invention is to ensure that the method for verifying the integrity of the document is robust to variations undergone by the document linked to its use, its conditions of use, etc.
  • the object of the invention is a method for securing a document including a visual element, carried out by a processing unit comprising processing means, the method comprising generation, from the visual element, of a reference security datum, and storage of the reference security datum,
  • reference security datum is generated by means of an algorithm configured so as to generate:
  • the algorithm is parameterized from training on a learning database.
  • the method according to the invention can further comprise at least one of the following characteristics:
  • Another object of the invention is a method for securing a document including a visual element, carried out by a processing unit comprising processing means, the method comprising generation, from the visual element, of a reference security datum, and storage of the reference security datum,
  • reference security datum is generated by means of an algorithm parameterized from training on a learning database
  • the algorithm is preferably configured so as to generate:
  • Another object of the invention is a computer program product, comprising code instructions for carrying out a method according to the foregoing description, when it is executed by processing means of a processing unit.
  • Another object of the invention is a secure document which can be obtained by carrying out a method according to the foregoing description.
  • Another object of the invention is a method for verifying the integrity of a document secured by carrying out the method according to the foregoing description, the method comprising the steps of:
  • the verification method further comprises, prior to the comparison step, a verification step of the integrity of the reference security datum.
  • a final object of the invention is a system for verifying a document, comprising:
  • the proposed method ensures the integrity of a visual element of a document such as a photograph, or again a chain of characters, a signature, etc.
  • attributed to each visual element is a reference security datum which is obtained by an algorithm configured so that the datum obtained is overall the same for all images of a same visual element, irrespective of the conditions of acquisition of the images or the wear of the element, and which is different for images of a different visual element.
  • the algorithm is trained on a learning database.
  • the integrity of the reference security datum can be guaranteed by means of a signature algorithm with public key or a coding algorithm called secure sketch. In this way, the security datum cannot be falsified by the individual carrying the document.
  • FIGS. 1 a and 1 b schematically illustrate a processing system for securing a document and a system for verifying the integrity of a document.
  • FIG. 2 schematically illustrates the main steps of a method for securing a document
  • FIG. 3 schematically illustrates the main steps of a method for verifying the integrity of a document.
  • this shows a processing system for securing a document, for example an identity document such as a passport, an identity card, etc.
  • a document for example an identity document such as a passport, an identity card, etc.
  • the type of document is not limited to an identity document, but could also relate to documents for playing, for example a personal smart card for playing at the casino, etc.
  • the document can be any “electronic document” (personal and/or identity documents type) which can be hosted on a smartphone or other portable devices, and comprising display means, for example a screen.
  • This system comprises a processing unit 10 , for example a computer or a server, having processing means 11 adapted to carry out an algorithm to be described in more detail hereinbelow.
  • the processing means 11 can for example be a calculator of type processor, microprocessor, microcontroller, etc.
  • the processing unit 10 can also be adapted to carry out cryptographic algorithms, for example of signature algorithm type with public key or of “secure sketch” type mentioned in more detail hereinbelow.
  • the processing unit 10 and the processing means 11 are operated by an entity considered non-fraudulent, typically a government in the event where the document is an identity document.
  • the system can also comprise a database 2 , and a processing unit 20 managing the database.
  • the processing unit can also be a computer or a server, having processing means 21 , for example a calculator of type processor, microprocessor, microcontroller, etc., letting the processing unit access the database for reading and writing.
  • the two processing units 10 , 20 advantageously comprise remote communication interfaces 12 , 22 for sending and receiving data, for example via wireless Internet, radiofrequency signal, etc.
  • a method 100 for securing a document comprises a visual element featured on the document.
  • This visual element is an image comprising pertinent data during use of the document.
  • the visual element is an image comprising data linked to the individual to whom the identity document is issued.
  • this is an identity photograph, i.e., a photograph representing a distinctive sign of the individual to whom the document has been issued, typically its face.
  • the visual element can also be an image of a distinctive sign of the individual, for example a handwritten signature.
  • the visual element can also be the representation on the document of a set of signs linked to the identity of the individual, for example a chain of characters (name, first name, date of birth, etc.).
  • the visual element can be the entire document, for example in the event where the document used is electronic and is displayed on a screen of an electronic device such as a tablet or a mobile telephone.
  • Securing the visual element is preferably carried out during creation of the document, to ensure that the visual element is authentic.
  • Securing of the visual element comprises generation 110 , by the processing unit 10 , from the visual element, of a security datum, called reference datum d r .
  • This datum advantageously takes the form of a sequence of bits, of a length from a few octets to a few tens of octets.
  • step 110 is carried out directly on the element.
  • step 110 can be carried out on an image of the visual element captured on the document by means of an appropriate digital image sensor (not shown).
  • the visual element can be processed before the reference security datum is generated. It can be advantageously reset relative to a referential, either by alignment, or by attempting to have particular points correspond, for example by using the SIFT method. Then the visual element can be standardized for example by the histogram equalization method.
  • the reference security datum d r is obtained from the visual element by carrying out an algorithm which is configured to obtain properties preferred for the reference security datum.
  • a first property is the following:
  • substantially identical security data mean security data having between them differences less than a determined threshold.
  • the number of differences between two security data can be evaluated as is known by using a metric adapted for example by calculating a distance between the data, such as for example Euclidian distance or Hamming distance.
  • the value of the threshold depends on the nature of the function calculated.
  • the acquisition conditions of the image of the visual element combine overall:
  • a security datum obtained from an image of the same visual element as that from which the reference security datum is obtained must be substantially identical to the latter.
  • substantially different security data mean security data having between them differences greater than the threshold previously mentioned.
  • a security datum obtained from an image of a visual element different to that from which the reference security datum d r is obtained must be substantially different to the reference security datum.
  • the security datum must be substantially the same as the reference security datum d r (i.e., exhibit differences less than a certain threshold) for all images taken of the same photograph of the same individual.
  • a security datum must be substantially different to the reference security datum d r if it is obtained from any other photograph of the same individual, or any photograph of another individual.
  • the algorithm is trained, i.e., parameterized on a learning database (not shown) containing a set of images.
  • the algorithm is executed on a large number of pairs of images, and indications are provided on those which must result in substantially identical security data (typically the same image captured at instants and/or in different conditions, for example when the image has deteriorated over time, friction, yellowing and/or during acquisition, luminosity, angle, etc.
  • the pair comprises two different images of a same object or different objects but of the same kind, more particularly when the pair includes two different images either of different individuals (or other objects), or of a same individual (or object), for example in the event where the other image has been taken at different moments and/or in different conditions).
  • the value of the threshold setting a classification between substantially identical data and substantially different data is determined by the algorithm on completion of its learning.
  • the learning database comprises the most images possible, for example at least 10,000 images, and preferably at least one million, as the more the database comprises images the more the learning on this database boosts the reliability of the algorithm.
  • the classification algorithm selected to generate the security datum from an image is advantageously a classification algorithm of the type employing a convolutional neural network also known by the acronym CNN.
  • a convolutional neural network includes a structure formed by a succession of operations carried out on an input datum (in this case an image), the operations comprising linear operations of convolution type, whereof the result is weighted by a weighting factor, and non-linear operations, for example thresholding, etc.
  • the adjustment of the algorithm during learning amounts to adjusting the values of the weighting factors.
  • the learning mode of parameters of the CNN algorithm such that it generates two different security data from different images of a same person, and the presence of non-linear operations in the generation of the datum from the visual element, prevents reconstitution of the image from the security datum and preserves confidentiality of data contained in the image on the individual.
  • the algorithm can be of the BRIEF type (for “Binary Robust Independent Elementary Feature”), such as described in the eponymous publication by Fua et al. (“Brief: Binary Robust Independent Elementary Features”; Calonder, Lepetit, Strecha, Fua; CvLab, EPFL).
  • BRIEF Binary Robust Independent Elementary Feature
  • the algorithm is here used to detect alterations to the visual element.
  • a learning step (“machine learning”) is used to generate the most adequate pattern of point pair (“point pair pattern”), founded on a minimal Hamming distance between the original visual element, typically the photograph of the face, and the visual element of the document (the original which has undergone alterations), and on a major Hamming distance between the original visual element and a fraudulent visual element.
  • the pattern is generated by selection from a large number of pairs of points drawn randomly.
  • a binary descriptor of type SIFT, SURF, GLOH, ORB, BRISK, FREAK, LATCH . . . , or same a descriptor of HOG type can be used (see hereinbelow).
  • These descriptors have been introduced to capture characteristic elements of images. Here they are constructed to also satisfy the foregoing properties: allowing recognition of the same image and preventing reconstruction of the visual element from a corresponding security datum.
  • the algorithm can be of the type employing a HOG descriptor, i.e., with a histogram of oriented gradient.
  • Such an algorithm is applied to an image distributed in areas. For each area, gradients are calculated for a set of points of the area, independently of their position in the area, and a histogram of directions of gradients is aggregated for all the gradients calculated on the area.
  • the algorithm then comprises concatenation of the set of histograms of gradients oriented for all the areas, and reduction of the vector obtained by a method of space reduction of a type for example of analysis in main components or linear discriminating analysis.
  • This algorithm can also comprise a preliminary processing step of images for standardizing the colors of images and the contrast factor.
  • parameterization of the algorithm on the learning database to satisfy the two properties detailed hereinabove on the conditions of similarity and dissimilarity of security data comprises adjustment of parameters linked to pre-processing, the size of selected areas, the number of gradients per area, the type of filters used to calculate the gradients, the kind of selected space reduction, etc.
  • a visual element comprising biometric information (such as a photograph)
  • biometric information such as a photograph
  • the above algorithms do not seek to recognize the person present on the visual element, as is often preferred in biometric identification, but only to know if the visual element is authentic. Consequently, this means that their execution does not involve identification of the person possessing the document.
  • a document comprising another visual element representing the person present on the visual reference element typically another photograph representing the same person as that present on the reference photograph
  • this datum is stored during a step 120 .
  • it can be stored in memory in an electronic chip integrated into the document.
  • the document can be printed on the document, visibly or not, i.e., for example as a watermark, in the form of a barcode, etc.
  • it can be stuck on, deposited or etched onto the document, so that there is a physical display.
  • the reference datum can be visible or invisible (as for known “digital watermark”).
  • the reference security datum d r is preferably stored in a database 2 managed by a manager processing unit 20 which can be reliable, for example dependent on a State agency. This limits access possibilities, by a malevolent individual or by the holder of the document himself to the datum stored in the document.
  • the processing unit 10 communicates the reference security datum to the processing unit 20 which stores it in the base.
  • This communication can be carried out over a secure channel and/or by means of a cryptographic protocol to ensure confidentiality of the datum.
  • the integrity of this security datum is itself preferably guaranteed.
  • the security datum can be signed by the processing unit 10 which has generated the security datum, for example by means of a signature algorithm with public key, conventionally using a private key which is detained by the unit 20 , and a public key.
  • the integrity of the security datum can be ensured by means of an algorithm of secure sketch type, i.e., a coding algorithm based on use of an error-correction code, which comprises execution, by the processing unit 10 , of the steps of:
  • this shows a verification system 3 of the integrity of a document. Verification can take place for example during a check of the document, or check of the identity of an individual in the event where the document is an identity document of the individual.
  • the verification system 3 advantageously comprises a processing unit 30 , comprising processing means 31 such as a computer, for example of type processor, microprocessor, microcontroller, etc.
  • the processing means 31 are adapted to carry out an algorithm identical to that which has already been described hereinabove to obtain a security datum from an image.
  • the verification system also comprises an image sensor 32 , typically a digital photographic device. It can be a photographic device integrated into a mobile telephone (smartphone) or a digital tablet.
  • the verification system 3 is advantageously integrated into a carry case so it can be deployed easily during a control; for example the verification system can be integrated into a mobile telephone, a digital tablet, etc.
  • the verification system 3 finally comprises a communications interface 33 adapted to remote-communicate with the manager processing unit 20 of the database 2 , for example via wireless Internet, radiofrequency signal, etc.
  • a verification method 200 of the integrity of a document comprises a first acquisition step 210 , with the image sensors 32 , of an image of the visual element of the document the integrity of which is to be verified.
  • the processing unit 30 executes 220 , from this image, the same algorithm as that which has been executed during the method for securing to obtain the reference security datum d r , and it obtains a new security datum d.
  • the image acquired during step 210 can be processed in the same way as for the visual element prior to generating the new security datum to blur the variations linked to taking the image. In this way the image can also be reset and standardized.
  • the processing unit 30 then recovers, from the database 2 or the document, the reference security datum d r corresponding to the visual element to be verified.
  • the verification method 200 comprises a verification step 230 of the integrity of the reference security datum.
  • the processing unit 30 of the verification system 3 verifies during a step 230 that the signature is valid by using the public key associated with the private key used during signing.
  • the processing unit 30 binarizes the new security datum d to obtain a binarized datum b′.
  • the processing unit 30 determines that the document is fraudulent.
  • the processing unit 30 compares during a step 240 the new security datum d to the reference security datum d r , by calculation between these data of an appropriate function such as a Euclidian distance, a Hamming distance, etc, and compares the result to a determined threshold, which corresponds to the threshold introduced hereinabove, and discriminating substantially identical images and substantially different images.
  • an appropriate function such as a Euclidian distance, a Hamming distance, etc
  • the method 200 finally comprises a determination step 250 , as a function of the result of the comparison, of the fraudulent character or not of the document. If the differences between the two data are less than the threshold, the document is considered integral. If not, the document is considered falsified.

Abstract

The invention relates to a method for securing a document including a visual element, carried out by a processing unit comprising processing means, the method comprising generation, from the visual element, of a reference security datum, and storage of the reference security datum,
wherein the reference security datum is generated by means of an algorithm configured so as to generate:
    • for any image acquired from the visual element, a security datum whereof the differences relative to the reference security datum are less than a determined threshold, and
    • for any image acquired on a different visual element, a security datum whereof the differences relative to the reference security datum are greater than said threshold.

Description

FIELD OF THE INVENTION
The invention relates to the field of securing documents comprising at least one visual element. Documents can be especially identity documents for example of identity card, driving license, birth certificate or passport type or else any “electronic document” (documents of personal and/or identity type) which can be hosted on a smartphone or other portable device having display means. The invention also relates to verification of the integrity of such documents once secured.
PRIOR ART
National security services have discovered frauds perpetrated using identity documents, wherein an authentic document provided with an original identity photograph has been falsified, by replacing the photograph by the photograph of a different person. Due to this the user of the falsified document can usurp the identity of the person to whom the identity document was initially issued.
In a more general context, demands imposed in terms of security to organizations designing and issuing identity documents are becoming stricter.
PRESENTATION OF THE INVENTION
An aim of the invention is to propose a method for securing a document, especially an identity document, ensuring especially the integrity of visual elements of the document such as photographs.
Another aim of the invention is to propose a method for verifying the integrity of a document secured by the proposed method.
Another aim of the invention is to ensure that the method for verifying the integrity of the document is robust to variations undergone by the document linked to its use, its conditions of use, etc.
In this respect, the object of the invention is a method for securing a document including a visual element, carried out by a processing unit comprising processing means, the method comprising generation, from the visual element, of a reference security datum, and storage of the reference security datum,
wherein the reference security datum is generated by means of an algorithm configured so as to generate:
    • for any image acquired from the visual element, a security datum whereof the differences relative to the reference security datum are less than a determined threshold, and
    • for any image acquired on a different visual element, a security datum whereof the differences relative to the reference security datum are greater than said threshold.
Preferably, the algorithm is parameterized from training on a learning database. Advantageously, but optionally, the method according to the invention can further comprise at least one of the following characteristics:
    • generation of the reference security datum is carried out during the creation of the document.
    • the reference security datum is stored in the document, by recording of the datum in an electronic chip stored in the document or display, for example printing, of the datum on the document.
    • the reference security datum is stored by being recorded in a database.
    • the reference security datum is signed by the processing unit, by means of a signature algorithm with public key, or recorded with a certificate of authenticity obtained by application of a coding algorithm based on use of an error-correction code, so-called secure sketch.
    • the reference security datum is stored in the document by display, for example printing, of the datum on the document and the visual element is also displayed, for example printed, on the document.
    • the document is an electronic document comprising display means, for example a screen.
    • the algorithm is selected such that reconstitution of the visual element from the corresponding security datum is impossible.
    • the algorithm is a descriptor algorithm of BRIEF type, or of SIFT type, or of SURF type or of GLOH type, or of ORB type, or of BRISK type or of FREAK type or of LATCH type.
    • the algorithm is of the type comprising the use of histograms of gradients oriented on the visual element, or of convolutional neural networks, or again of BRIEF type, or of SIFT type, or of SURF type or of GLOH type, or of ORB type, or of BRISK type or of FREAK type or of LATCH type.
    • for training the algorithm, the algorithm is executed
      • on a large number of pairs of images, and indications are provided on those which must result in substantially identical security data, (typically the same image captured at instants and/or in different conditions, for example when the image has deteriorated over time, friction, yellowing and/or during acquisition, luminosity, angle, etc. are not the same), and
      • on other pairs of images which must result in substantially different security data, (typically when the pair comprises two different images or different individuals, or the same individual, for example in the event where the other image has been taken at different times and/or under different conditions).
    • the visual element is an image of the face of an individual, and the algorithm is trained so as to generate:
      • for any image acquired from the image of the face of the individual featured on the document, a security datum whereof the differences relative to the reference security datum are less than a determined threshold, and
      • for any image acquired from an image representing another individual, or the same individual in different image acquisition conditions, a security datum whereof the differences relative to the reference security datum are greater than said threshold.
Another object of the invention is a method for securing a document including a visual element, carried out by a processing unit comprising processing means, the method comprising generation, from the visual element, of a reference security datum, and storage of the reference security datum,
wherein the reference security datum is generated by means of an algorithm parameterized from training on a learning database,
wherein, for training the algorithm, the algorithm is executed
    • on a large number of pairs of images, and indications are provided on those which must result in substantially identical security data,
    • on other pairs of images which must result in substantially different security data.
In particular, the algorithm is preferably configured so as to generate:
    • for any image acquired from the visual element, a security datum whereof the differences relative to the reference security datum are less than a determined threshold, and
    • for any image acquired on a different visual element, a security datum whereof the differences relative to the reference security datum are greater than said threshold.
The additional characteristics described previously apply also for this object.
Another object of the invention is a computer program product, comprising code instructions for carrying out a method according to the foregoing description, when it is executed by processing means of a processing unit.
Another object of the invention is a secure document which can be obtained by carrying out a method according to the foregoing description.
Another object of the invention is a method for verifying the integrity of a document secured by carrying out the method according to the foregoing description, the method comprising the steps of:
    • acquiring an image of the visual element of the document,
    • generating, from the image, a security datum by the same algorithm as that having generated the reference security datum,
    • comparing the security datum obtained to the reference security datum, and
    • if the differences between the security datum and the reference security datum are less than the determined threshold, determining that the visual element is integral, if not determining that the visual element is fraudulent.
Advantageously, but optionally, the verification method further comprises, prior to the comparison step, a verification step of the integrity of the reference security datum.
A final object of the invention is a system for verifying a document, comprising:
    • an image sensor,
    • a processing unit, comprising processing means adapted to carry out, on an image acquired by the sensor, a classification algorithm, and a communications interface with a database,
      the verification system being configured to carry out the verification method according to the foregoing description.
The proposed method ensures the integrity of a visual element of a document such as a photograph, or again a chain of characters, a signature, etc. In fact, attributed to each visual element is a reference security datum which is obtained by an algorithm configured so that the datum obtained is overall the same for all images of a same visual element, irrespective of the conditions of acquisition of the images or the wear of the element, and which is different for images of a different visual element.
For this, the algorithm is trained on a learning database.
To further reinforce the security of the document, the integrity of the reference security datum can be guaranteed by means of a signature algorithm with public key or a coding algorithm called secure sketch. In this way, the security datum cannot be falsified by the individual carrying the document.
DESCRIPTION OF THE FIGURES
Other characteristics, aims and advantages of the present invention will emerge from the following detailed description, with respect to the appended figures, given by way of non-limiting examples and in which:
FIGS. 1a and 1b schematically illustrate a processing system for securing a document and a system for verifying the integrity of a document.
FIG. 2 schematically illustrates the main steps of a method for securing a document,
FIG. 3 schematically illustrates the main steps of a method for verifying the integrity of a document.
DETAILED DESCRIPTION OF AT LEAST ONE EMBODIMENT OF THE INVENTION
Securing a Document
In reference to FIG. 1a , this shows a processing system for securing a document, for example an identity document such as a passport, an identity card, etc. The type of document is not limited to an identity document, but could also relate to documents for playing, for example a personal smart card for playing at the casino, etc. The document can be any “electronic document” (personal and/or identity documents type) which can be hosted on a smartphone or other portable devices, and comprising display means, for example a screen.
This system comprises a processing unit 10, for example a computer or a server, having processing means 11 adapted to carry out an algorithm to be described in more detail hereinbelow. The processing means 11 can for example be a calculator of type processor, microprocessor, microcontroller, etc.
The processing unit 10 can also be adapted to carry out cryptographic algorithms, for example of signature algorithm type with public key or of “secure sketch” type mentioned in more detail hereinbelow.
The processing unit 10 and the processing means 11 are operated by an entity considered non-fraudulent, typically a government in the event where the document is an identity document.
Advantageously, the system can also comprise a database 2, and a processing unit 20 managing the database. The processing unit can also be a computer or a server, having processing means 21, for example a calculator of type processor, microprocessor, microcontroller, etc., letting the processing unit access the database for reading and writing.
The two processing units 10, 20 advantageously comprise remote communication interfaces 12, 22 for sending and receiving data, for example via wireless Internet, radiofrequency signal, etc.
In reference to FIG. 2, a method 100 for securing a document comprises a visual element featured on the document.
This visual element is an image comprising pertinent data during use of the document. In the case of an identity document, the visual element is an image comprising data linked to the individual to whom the identity document is issued. Advantageously, this is an identity photograph, i.e., a photograph representing a distinctive sign of the individual to whom the document has been issued, typically its face. Alternatively, the visual element can also be an image of a distinctive sign of the individual, for example a handwritten signature.
The visual element can also be the representation on the document of a set of signs linked to the identity of the individual, for example a chain of characters (name, first name, date of birth, etc.).
According to another variant, the visual element can be the entire document, for example in the event where the document used is electronic and is displayed on a screen of an electronic device such as a tablet or a mobile telephone.
Securing the visual element is preferably carried out during creation of the document, to ensure that the visual element is authentic.
Securing of the visual element comprises generation 110, by the processing unit 10, from the visual element, of a security datum, called reference datum dr. This datum advantageously takes the form of a sequence of bits, of a length from a few octets to a few tens of octets.
If the visual element is a digital image inserted in the document during its manufacture, step 110 is carried out directly on the element. Alternatively, step 110 can be carried out on an image of the visual element captured on the document by means of an appropriate digital image sensor (not shown).
The visual element can be processed before the reference security datum is generated. It can be advantageously reset relative to a referential, either by alignment, or by attempting to have particular points correspond, for example by using the SIFT method. Then the visual element can be standardized for example by the histogram equalization method.
The reference security datum dr is obtained from the visual element by carrying out an algorithm which is configured to obtain properties preferred for the reference security datum.
A first property is the following:
    • Images acquired from a same visual element, irrespective of the conditions of acquisition, must result in obtaining substantially identical security data via the algorithm.
Hereinbelow, “substantially identical security data” mean security data having between them differences less than a determined threshold. The number of differences between two security data can be evaluated as is known by using a metric adapted for example by calculating a distance between the data, such as for example Euclidian distance or Hamming distance. The value of the threshold depends on the nature of the function calculated.
The acquisition conditions of the image of the visual element combine overall:
    • uncertainties linked to the conditions of the acquisition itself with an image sensor, for example the lighting conditions, the parameters of the image sensor, the distance from the visual element relative to the sensor, etc., and:
    • uncertainties linked to the appearance of the visual element, such as for example a variation in appearance of the document originating from its ageing, yellowing of a photograph, the appearance of scratches or marks, or even a variation in appearance linked to additions made to heighten security of the document: presence on a part of the element of a buffer, a hologram, etc.
In particular, a security datum obtained from an image of the same visual element as that from which the reference security datum is obtained must be substantially identical to the latter.
Another property is the following:
    • Images acquired of different visual elements must result in obtaining, via the algorithm, substantially different security data.
Hereinbelow, “substantially different security data” mean security data having between them differences greater than the threshold previously mentioned.
In particular, a security datum obtained from an image of a visual element different to that from which the reference security datum dr is obtained, must be substantially different to the reference security datum.
Also, in the event where the visual element of the document is a photograph of an individual, the security datum must be substantially the same as the reference security datum dr (i.e., exhibit differences less than a certain threshold) for all images taken of the same photograph of the same individual.
However, a security datum must be substantially different to the reference security datum dr if it is obtained from any other photograph of the same individual, or any photograph of another individual.
To obtain these properties, the algorithm is trained, i.e., parameterized on a learning database (not shown) containing a set of images. During this training, the algorithm is executed on a large number of pairs of images, and indications are provided on those which must result in substantially identical security data (typically the same image captured at instants and/or in different conditions, for example when the image has deteriorated over time, friction, yellowing and/or during acquisition, luminosity, angle, etc. are not the same), and on other pairs of images which must result in substantially different security data (typically when the pair comprises two different images of a same object or different objects but of the same kind, more particularly when the pair includes two different images either of different individuals (or other objects), or of a same individual (or object), for example in the event where the other image has been taken at different moments and/or in different conditions).
The value of the threshold setting a classification between substantially identical data and substantially different data is determined by the algorithm on completion of its learning.
Advantageously, the learning database comprises the most images possible, for example at least 10,000 images, and preferably at least one million, as the more the database comprises images the more the learning on this database boosts the reliability of the algorithm.
The classification algorithm selected to generate the security datum from an image is advantageously a classification algorithm of the type employing a convolutional neural network also known by the acronym CNN.
As is known to the skilled person, a convolutional neural network includes a structure formed by a succession of operations carried out on an input datum (in this case an image), the operations comprising linear operations of convolution type, whereof the result is weighted by a weighting factor, and non-linear operations, for example thresholding, etc.
The adjustment of the algorithm during learning amounts to adjusting the values of the weighting factors.
An example of a structure of a convolutional neural network applicable to generation of a security datum from an image is that which is detailed for the network F1 of the document by Y. Sun et al., “Deep Convolutional Network Cascade for Facial Point Detection”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2013.
The learning mode of parameters of the CNN algorithm, such that it generates two different security data from different images of a same person, and the presence of non-linear operations in the generation of the datum from the visual element, prevents reconstitution of the image from the security datum and preserves confidentiality of data contained in the image on the individual.
Alternatively, the algorithm can be of the BRIEF type (for “Binary Robust Independent Elementary Feature”), such as described in the eponymous publication by Fua et al. (“Brief: Binary Robust Independent Elementary Features”; Calonder, Lepetit, Strecha, Fua; CvLab, EPFL). However, inversely to this publication where the BRIEF algorithm is used is extract characteristics (“features”) from images, the algorithm is here used to detect alterations to the visual element. So, in place of BRIEF weighting (“weight factors”), a learning step (“machine learning”) is used to generate the most adequate pattern of point pair (“point pair pattern”), founded on a minimal Hamming distance between the original visual element, typically the photograph of the face, and the visual element of the document (the original which has undergone alterations), and on a major Hamming distance between the original visual element and a fraudulent visual element. The pattern is generated by selection from a large number of pairs of points drawn randomly.
Alternatively, another binary descriptor of type SIFT, SURF, GLOH, ORB, BRISK, FREAK, LATCH . . . , or same a descriptor of HOG type can be used (see hereinbelow). These descriptors have been introduced to capture characteristic elements of images. Here they are constructed to also satisfy the foregoing properties: allowing recognition of the same image and preventing reconstruction of the visual element from a corresponding security datum.
Alternatively, the algorithm can be of the type employing a HOG descriptor, i.e., with a histogram of oriented gradient.
Such an algorithm is applied to an image distributed in areas. For each area, gradients are calculated for a set of points of the area, independently of their position in the area, and a histogram of directions of gradients is aggregated for all the gradients calculated on the area.
The algorithm then comprises concatenation of the set of histograms of gradients oriented for all the areas, and reduction of the vector obtained by a method of space reduction of a type for example of analysis in main components or linear discriminating analysis.
This algorithm can also comprise a preliminary processing step of images for standardizing the colors of images and the contrast factor.
Reference could be made to the publication by N. Dalai et al., “Histograms of Oriented Gradients for Human Detection”, Conference on Computer Vision and Pattern Recognition, 2005, for more details and an example of implementation of an algorithm based on a HOG descriptor.
In this embodiment, parameterization of the algorithm on the learning database to satisfy the two properties detailed hereinabove on the conditions of similarity and dissimilarity of security data, comprises adjustment of parameters linked to pre-processing, the size of selected areas, the number of gradients per area, the type of filters used to calculate the gradients, the kind of selected space reduction, etc.
The use of such an algorithm, which eliminates location of information on the image, also ensures confidentiality of visual elements and prevents reconstituting a visual element from a corresponding security datum.
Preferably, in the case of a visual element comprising biometric information (such as a photograph), the above algorithms do not seek to recognize the person present on the visual element, as is often preferred in biometric identification, but only to know if the visual element is authentic. Consequently, this means that their execution does not involve identification of the person possessing the document. This is why a document comprising another visual element representing the person present on the visual reference element (typically another photograph representing the same person as that present on the reference photograph) will be considered as fraudulent after verification, while it would result in authentication or biometric identification.
Once the reference security datum dr is obtained for the visual element of the document, this datum is stored during a step 120.
It can be stored in the document itself. For example, it can be stored in memory in an electronic chip integrated into the document.
Alternatively, it can be printed on the document, visibly or not, i.e., for example as a watermark, in the form of a barcode, etc.
Alternatively, it can be stuck on, deposited or etched onto the document, so that there is a physical display.
In the two foregoing alternatives, the reference datum can be visible or invisible (as for known “digital watermark”).
More generally, this is display.
But the reference security datum dr is preferably stored in a database 2 managed by a manager processing unit 20 which can be reliable, for example dependent on a State agency. This limits access possibilities, by a malevolent individual or by the holder of the document himself to the datum stored in the document.
In this case, the processing unit 10 communicates the reference security datum to the processing unit 20 which stores it in the base. This communication can be carried out over a secure channel and/or by means of a cryptographic protocol to ensure confidentiality of the datum.
Also, and irrespective of the storage medium of the security datum, the integrity of this security datum is itself preferably guaranteed.
For example, the security datum can be signed by the processing unit 10 which has generated the security datum, for example by means of a signature algorithm with public key, conventionally using a private key which is detained by the unit 20, and a public key.
As a variant, the integrity of the security datum can be ensured by means of an algorithm of secure sketch type, i.e., a coding algorithm based on use of an error-correction code, which comprises execution, by the processing unit 10, of the steps of:
    • Binarizing if needed the security datum to produce a datum b,
    • From a word c of an error-correction code, obtaining from the reference a result such as r=[c XOR b, h(c)], where XOR is the function “exclusive or”, and h is a function of cryptographic hashing, for example of SHA-256 type, and record the result r with the security datum, either in the document or in the database 2.
      Verification of the Integrity of a Document
In reference to FIG. 1b , this shows a verification system 3 of the integrity of a document. Verification can take place for example during a check of the document, or check of the identity of an individual in the event where the document is an identity document of the individual.
The verification system 3 advantageously comprises a processing unit 30, comprising processing means 31 such as a computer, for example of type processor, microprocessor, microcontroller, etc.
The processing means 31 are adapted to carry out an algorithm identical to that which has already been described hereinabove to obtain a security datum from an image.
The verification system also comprises an image sensor 32, typically a digital photographic device. It can be a photographic device integrated into a mobile telephone (smartphone) or a digital tablet.
The verification system 3 is advantageously integrated into a carry case so it can be deployed easily during a control; for example the verification system can be integrated into a mobile telephone, a digital tablet, etc.
If needed, if the reference security datum is recorded in the database 2, the verification system 3 finally comprises a communications interface 33 adapted to remote-communicate with the manager processing unit 20 of the database 2, for example via wireless Internet, radiofrequency signal, etc.
In reference to FIG. 3, a verification method 200 of the integrity of a document comprises a first acquisition step 210, with the image sensors 32, of an image of the visual element of the document the integrity of which is to be verified.
Then, the processing unit 30 executes 220, from this image, the same algorithm as that which has been executed during the method for securing to obtain the reference security datum dr, and it obtains a new security datum d.
Advantageously, the image acquired during step 210 can be processed in the same way as for the visual element prior to generating the new security datum to blur the variations linked to taking the image. In this way the image can also be reset and standardized.
The processing unit 30 then recovers, from the database 2 or the document, the reference security datum dr corresponding to the visual element to be verified.
Advantageously, the verification method 200 comprises a verification step 230 of the integrity of the reference security datum.
If the reference security datum dr has been signed by the processing unit 10, the processing unit 30 of the verification system 3 verifies during a step 230 that the signature is valid by using the public key associated with the private key used during signing.
If the reference security datum is recorded with a result r of the application of a secure sketch algorithm, the integrity of the reference datum is verified during a same step 230 by the processing unit 30. For this to happen, the processing unit 30 binarizes the new security datum d to obtain a binarized datum b′.
It then calculates c XOR b XOR b′ from the datum r. If b and b′ are sufficiently close then this operation provides the code word c used initially by the unit 10, because of the corrective capacity of the corrective code and therefore ensures the integrity of the reference security datum.
If the result of verification step 230 indicates that the reference security datum is not integral, the processing unit 30 determines that the document is fraudulent.
If the result of verification step 230 indicates that the reference security datum is integral, the processing unit 30 compares during a step 240 the new security datum d to the reference security datum dr, by calculation between these data of an appropriate function such as a Euclidian distance, a Hamming distance, etc, and compares the result to a determined threshold, which corresponds to the threshold introduced hereinabove, and discriminating substantially identical images and substantially different images.
The method 200 finally comprises a determination step 250, as a function of the result of the comparison, of the fraudulent character or not of the document. If the differences between the two data are less than the threshold, the document is considered integral. If not, the document is considered falsified.

Claims (18)

The invention claimed is:
1. A method for securing a document including a visual element, carried out by a processing unit comprising processing means, the method comprising
generation, from the visual element, of a reference security datum, and
storage of the reference security datum,
wherein the reference security datum is generated by processing means of an algorithm parameterized from training on a learning database,
wherein, for training the algorithm, the algorithm is executed
on a large number of pairs of images, and indications are provided on those which must result in substantially identical security data,
on other pairs of images which must result in substantially different security data.
2. The method for securing a document according to claim 1, wherein generation of the reference security datum is carried out during creation of the document.
3. The method for securing a document according to claim 1, wherein the reference security datum is stored in the document, by display, for example printing, of the datum on the document or by recording of the datum in an electronic chip stored in the document.
4. The method for securing a document according to claim 3, wherein the reference security datum is signed by the processing unit, by processing means of a signature algorithm with public key, or recorded with a certificate of authenticity obtained by application of a coding algorithm based on use of an error-correction code, so-called secure sketch.
5. The method for securing a document according to claim 1, wherein the reference security datum is stored by being recorded in a database.
6. The method for securing a document according to claim 1, wherein the reference security datum is stored in the document by display, for example printing, of the datum on the document and wherein the visual element is also displayed, for example printed, on the document.
7. The method for securing a document according to claim 1, wherein the document is an electronic document preferably comprising display means.
8. The method for securing a document according to claim 1, wherein the algorithm is selected such that reconstitution of the visual element from the corresponding security datum is impossible.
9. The method for securing a document according to claim 1, wherein the algorithm is of the type comprising the use of histograms of gradients oriented on the visual element, or of convolutional neural networks, or of descriptor algorithm type.
10. The method for securing a document according to claim 1, wherein the algorithm is a descriptor algorithm of BRIEF type, or
of SIFT type, or of SURF type or of GLOH type, or of ORB type, or of BRISK type or
of FREAK type or of LATCH type.
11. The method for securing a document according to claim 1, wherein said algorithm being trained so as to generate:
for any image acquired from the visual element, a security datum whereof the differences relative to the reference security datum are less than a determined threshold, and
for any image acquired on a different visual element, a security datum whereof the differences relative to the reference security datum are greater than said threshold.
12. A computer program product stored on a non-transitory medium, comprising code instructions for carrying out a method according to claim 1, when it is executed by processing means of a processing unit.
13. A secure document which can be obtained by carrying out a method according to claim 1.
14. The method for securing a document according to claim 1, wherein the visual element is an image of the face of an individual, and the algorithm is trained so as to generate:
for any image acquired from the image of the face of the individual featured on the document, a security datum whereof the differences relative to the reference security datum are less than a determined threshold, and
for any image acquired from an image representing another individual, or the same individual in different image acquisition conditions, a security datum whereof the differences relative to the reference security datum are greater than said threshold.
15. The method for securing a document including a visual element, carried out by a processing unit comprising processing means, the method
comprising generation, from the visual element, of a reference security datum, and storage of the reference security datum,
wherein the reference security datum is generated by processing means of an algorithm parameterized from training on a learning database, said algorithm being trained so as to generate:
for any image acquired from the visual element, a security datum whereof the differences relative to the reference security datum are less than a determined threshold, and
for any image acquired on a different visual element, a security datum whereof the differences relative to the reference security datum are greater than said threshold.
16. A method for verifying the integrity of a document secured by carrying out the method according to claim 1, the method comprising the steps of:
acquiring an image of the visual element of the document,
generating, from the image, a security datum by the same algorithm as that having generated the reference security datum,
comparing the security datum obtained to the reference security datum, and
if the differences between the security datum and the reference security datum are less than the determined threshold, determining that the visual element is integral, if not determining that the visual element is fraudulent.
17. The verification method according to claim 16, wherein the method further comprises, prior to the comparison step, a verification step of the integrity of the reference security datum.
18. A system for verifying a document, comprising:
an image sensor,
a processing unit, comprising processing means adapted to carry out, on an image acquired by the sensor, a classification algorithm, and a communications interface with a database,
the verification system being configured to carry out the method according to claim 16.
US15/429,093 2016-02-11 2017-02-09 Method for securing and verifying a document Active 2037-05-16 US10403076B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1651105A FR3047688B1 (en) 2016-02-11 2016-02-11 METHOD OF SECURING AND VERIFYING A DOCUMENT
FR1651105 2016-02-11

Publications (2)

Publication Number Publication Date
US20170236355A1 US20170236355A1 (en) 2017-08-17
US10403076B2 true US10403076B2 (en) 2019-09-03

Family

ID=56511640

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/429,093 Active 2037-05-16 US10403076B2 (en) 2016-02-11 2017-02-09 Method for securing and verifying a document

Country Status (5)

Country Link
US (1) US10403076B2 (en)
EP (1) EP3206192A1 (en)
AU (1) AU2017200935B2 (en)
CA (1) CA2957774C (en)
FR (1) FR3047688B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11722306B2 (en) 2019-05-24 2023-08-08 Idemia Identity & Security France Method for strong authentication of an individual

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6858525B2 (en) * 2016-10-07 2021-04-14 グローリー株式会社 Money classification device and money classification method
FR3079333B1 (en) 2018-03-21 2021-05-14 Idemia Identity & Security France DATA RECORDING PROCESS FOR CHECKING AN IDENTITY, AND IDENTITY CHECKING PROCEDURE
FR3086884B1 (en) 2018-10-09 2020-11-27 Idemia Identity & Security France DOCUMENTARY FRAUD DETECTION PROCESS.
FR3092414B1 (en) 2019-02-01 2021-01-08 Idemia Identity & Security France Authentication process, server and electronic identity device
FR3095372B1 (en) 2019-04-25 2021-04-30 Idemia Identity & Security France METHODS for enrolling data of an individual's identity document AND authenticating an identity document
FR3095371B1 (en) 2019-04-25 2021-04-30 Idemia Identity & Security France Method for authenticating an individual's identity document and possibly for authenticating said individual
FR3118240B1 (en) 2020-12-23 2022-12-23 Idemia France Method for opening a secure wireless communication channel between a microcircuit card and a reading device using a visual code and a pattern of electrically conductive material
FR3123742A1 (en) 2021-06-02 2022-12-09 Idemia Identity & Security France METHODS for enlisting data to verify the authenticity of security data or for verifying the authenticity of security data
FR3135544A1 (en) 2022-05-16 2023-11-17 Idemia Identity & Security France Method of authenticating an identity document of an individual and possibly authenticating said individual and authenticating an individual presenting an identity document as his or her own

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1139302A1 (en) 1998-12-07 2001-10-04 Hitachi, Ltd. Method of checking authenticity of sheet with built-in electronic circuit chip
US20060015733A1 (en) * 2004-06-24 2006-01-19 John H. Harland Company Process and system for the material reduction of counterfeit and identity-maker fraud
US20080149713A1 (en) * 2003-08-13 2008-06-26 Brundage Trent J Detecting Media Areas Likely of Hosting Watermarks
US20080294900A1 (en) 2004-08-13 2008-11-27 Ingenia Technology Limited Authenticity Verification of Articles Using a Database
US20100185864A1 (en) * 2008-12-19 2010-07-22 University Of South Carolina Multi-Dimensional Credentialing Using Veiled Certificates
EP2290619A1 (en) 2009-08-25 2011-03-02 Gemalto SA Method and device for verifying secure documents
US20130173484A1 (en) * 2010-09-18 2013-07-04 Philip Wesby System and Method for Encoding and Controlled Authentication
US20180165781A1 (en) * 2015-02-13 2018-06-14 Yoti Holding Limited Digital Identity System
US20180181964A1 (en) * 2015-02-13 2018-06-28 Yoti Holding Limited Secure Electronic Payment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075975B2 (en) 2012-02-21 2015-07-07 Andrew Bud Online pseudonym verification and identity validation
CN103324946B (en) * 2013-07-11 2016-08-17 广州广电运通金融电子股份有限公司 A kind of method and system of paper money recognition classification

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1139302A1 (en) 1998-12-07 2001-10-04 Hitachi, Ltd. Method of checking authenticity of sheet with built-in electronic circuit chip
US20080149713A1 (en) * 2003-08-13 2008-06-26 Brundage Trent J Detecting Media Areas Likely of Hosting Watermarks
US20060015733A1 (en) * 2004-06-24 2006-01-19 John H. Harland Company Process and system for the material reduction of counterfeit and identity-maker fraud
US20080294900A1 (en) 2004-08-13 2008-11-27 Ingenia Technology Limited Authenticity Verification of Articles Using a Database
US20100185864A1 (en) * 2008-12-19 2010-07-22 University Of South Carolina Multi-Dimensional Credentialing Using Veiled Certificates
EP2290619A1 (en) 2009-08-25 2011-03-02 Gemalto SA Method and device for verifying secure documents
US20130173484A1 (en) * 2010-09-18 2013-07-04 Philip Wesby System and Method for Encoding and Controlled Authentication
US20180165781A1 (en) * 2015-02-13 2018-06-14 Yoti Holding Limited Digital Identity System
US20180181964A1 (en) * 2015-02-13 2018-06-28 Yoti Holding Limited Secure Electronic Payment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Search Report in French Application No. 1651105 dated Dec. 8, 2016, with English translation coversheet. 3 pages.
Written Opinion in French Application No. 1651105 dated Dec. 15, 2016, with English translation coversheet. 6 pages.

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11722306B2 (en) 2019-05-24 2023-08-08 Idemia Identity & Security France Method for strong authentication of an individual

Also Published As

Publication number Publication date
CA2957774A1 (en) 2017-08-11
AU2017200935A1 (en) 2017-08-31
AU2017200935B2 (en) 2022-07-28
CA2957774C (en) 2023-08-08
FR3047688A1 (en) 2017-08-18
US20170236355A1 (en) 2017-08-17
EP3206192A1 (en) 2017-08-16
FR3047688B1 (en) 2018-02-16

Similar Documents

Publication Publication Date Title
US10403076B2 (en) Method for securing and verifying a document
US11120250B2 (en) Method, system and computer program for comparing images
US11080384B2 (en) Systems and methods for authentication using digital signature with biometrics
US9946865B2 (en) Document authentication based on expected wear
US9396383B2 (en) System, method and computer program for verifying a signatory of a document
US20210117529A1 (en) Authenticating an identity of a person
JP2020525947A (en) Manipulated image detection
JP5676592B2 (en) Robust biometric feature extraction with and without reference points
CN110008664A (en) Authentication information acquisition, account-opening method, device and electronic equipment
CN112613345A (en) User authentication method and system
CN112597810A (en) Identity document authentication method and system
CN112434727A (en) Identity document authentication method and system
GB2548774A (en) Method, system and computer program for comparing images
US20220019786A1 (en) Methods and systems for detecting photograph replacement in a photo identity document
GB2546714A (en) Method, system and computer program for comparing images
CN112613346A (en) Method and device for processing identity document
GB2539302A (en) Method, system and computer program for comparing images

Legal Events

Date Code Title Description
AS Assignment

Owner name: SAFRAN IDENTITY & SECURITY, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHABANNE, HERVE;FONDEUR, JEAN-CHRISTOPHE;GENTRIC, STEPHANE;AND OTHERS;REEL/FRAME:044113/0174

Effective date: 20170424

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:SAFRAN IDENTITY & SECURITY;REEL/FRAME:052555/0428

Effective date: 20171002

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4